Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(27) { ["id"]=> int(1724) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2021-11-17 16:19:58" ["sectionId"]=> int(38) ["seq"]=> int(0) ["submissionId"]=> int(1607) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(4) "5-16" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.1" ["abstract"]=> array(2) { ["en_US"]=> string(853) "

Information communication technology (ICT) has changed our life and it has a determinant role in our everyday activities; over the last years it has created a constantly changing, developing and complex ecosystem. In this paper, we argue, that this newly formed environment, requires new approaches for exploring technology and society relationships, and we pose the general question how pervasive ICT ecosystem shape interactions and relationships between humans and technology on different levels. This question is pivotal for understanding challenges of information security; in our contribution, we present a four-phase comprehensive research program systematically analysing a) our new smart environment, b) various dimensions of information security awareness, c) the role of leadership and finally d) the importance of strategic alignment.

" ["hu_HU"]=> string(853) "

Information communication technology (ICT) has changed our life and it has a determinant role in our everyday activities; over the last years it has created a constantly changing, developing and complex ecosystem. In this paper, we argue, that this newly formed environment, requires new approaches for exploring technology and society relationships, and we pose the general question how pervasive ICT ecosystem shape interactions and relationships between humans and technology on different levels. This question is pivotal for understanding challenges of information security; in our contribution, we present a four-phase comprehensive research program systematically analysing a) our new smart environment, b) various dimensions of information security awareness, c) the role of leadership and finally d) the importance of strategic alignment.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(142) "Structuration Theory and Strategic Alignment in Information Security Management: Introduction of a Comprehensive Research Approach and Program" ["hu_HU"]=> string(142) "Structuration Theory and Strategic Alignment in Information Security Management: Introduction of a Comprehensive Research Approach and Program" } ["locale"]=> string(5) "en_US" ["authors"]=> array(4) { [0]=> object(Author)#734 (6) { ["_data"]=> array(15) { ["id"]=> int(1840) ["email"]=> string(24) "kovacs.laszlo@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1724) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kovács" ["hu_HU"]=> string(7) "Kovács" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "László" ["hu_HU"]=> string(8) "László" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#717 (6) { ["_data"]=> array(15) { ["id"]=> int(1841) ["email"]=> string(27) "nemeslaki.andras@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1724) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Nemeslaki" ["hu_HU"]=> string(9) "Nemeslaki" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "András" ["hu_HU"]=> string(7) "András" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#711 (6) { ["_data"]=> array(15) { ["id"]=> int(1842) ["email"]=> string(21) "orbok.akos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1724) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Orbók" ["hu_HU"]=> string(6) "Orbók" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Ákos" ["hu_HU"]=> string(5) "Ákos" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [3]=> object(Author)#712 (6) { ["_data"]=> array(15) { ["id"]=> int(1843) ["email"]=> string(23) "szabo.andras@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1724) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Szabó" ["hu_HU"]=> string(6) "Szabó" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "András" ["hu_HU"]=> string(7) "András" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(11) "information" [1]=> string(13) "communication" [2]=> string(10) "technology" [3]=> string(8) "security" [4]=> string(8) "research" } ["en_US"]=> array(5) { [0]=> string(11) "information" [1]=> string(13) "communication" [2]=> string(10) "technology" [3]=> string(8) "security" [4]=> string(8) "research" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#748 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19915) ["id"]=> int(919) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1724) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(29) { ["id"]=> int(1719) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2022-01-07 15:31:32" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(1602) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "17-27" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.2" ["abstract"]=> array(2) { ["en_US"]=> string(490) "

The author shall summarize the history of Hungarian military parachuting and share it with those interested in the topic. The article begins with the Imperial and Royal Aviation Troops of the Austro-Hungarian Empire parachute activities followed by the history of the participation in World War II and during the Warsaw Pact era until recent years.
In Hungary, so far, only a few books have been published covering the history and activities of parachute and special forces units.

" ["hu_HU"]=> string(490) "

The author shall summarize the history of Hungarian military parachuting and share it with those interested in the topic. The article begins with the Imperial and Royal Aviation Troops of the Austro-Hungarian Empire parachute activities followed by the history of the participation in World War II and during the Warsaw Pact era until recent years.
In Hungary, so far, only a few books have been published covering the history and activities of parachute and special forces units.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(37) "Military Parachute History of Hungary" ["hu_HU"]=> string(37) "Military Parachute History of Hungary" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(1844) ["email"]=> string(22) "boda.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1719) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Boda" ["hu_HU"]=> string(4) "Boda" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(25) "long-range reconnaissance" [1]=> string(20) "military parachuting" [2]=> string(9) "parachute" [3]=> string(27) "paratroopers special forces" } ["en_US"]=> array(4) { [0]=> string(25) "long-range reconnaissance" [1]=> string(20) "military parachuting" [2]=> string(9) "parachute" [3]=> string(27) "paratroopers special forces" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#764 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21282) ["id"]=> int(920) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1719) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(29) { ["id"]=> int(1726) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2022-01-07 15:30:45" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(1609) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "29-35" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.3" ["abstract"]=> array(2) { ["en_US"]=> string(504) "

Recently, aerospace (flight) engineers, having more solid mathematical backgrounds, have become familiar with the newest results in control theory and are able not only to formulate control problems but also solve them without attracting the attention of control experts. Moreover, they try to apply new results in control theory to specific aerospace and missile guidance problems. As a result, control theory is losing its biggest supplier and, to a certain degree, this slows down its progress.

" ["hu_HU"]=> string(504) "

Recently, aerospace (flight) engineers, having more solid mathematical backgrounds, have become familiar with the newest results in control theory and are able not only to formulate control problems but also solve them without attracting the attention of control experts. Moreover, they try to apply new results in control theory to specific aerospace and missile guidance problems. As a result, control theory is losing its biggest supplier and, to a certain degree, this slows down its progress.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(44) "Missile Mathematical Model and System Design" ["hu_HU"]=> string(44) "Missile Mathematical Model and System Design" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#115 (6) { ["_data"]=> array(15) { ["id"]=> int(1846) ["email"]=> string(16) "pappi@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1726) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Papp" ["hu_HU"]=> string(4) "Papp" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(12) "mathematical" [1]=> string(7) "control" [2]=> string(7) "missile" [3]=> string(19) "equations of motion" } ["en_US"]=> array(4) { [0]=> string(12) "mathematical" [1]=> string(7) "control" [2]=> string(7) "missile" [3]=> string(19) "equations of motion" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#743 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21281) ["id"]=> int(921) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1726) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(27) { ["id"]=> int(1729) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2021-11-17 16:20:58" ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(1612) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "37-52" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.4" ["abstract"]=> array(2) { ["en_US"]=> string(1309) "

These past years, cyber-attacks became a daily issue for enterprises. A possible defence against this kind of threat is intrusion detection. One of the key challenges is information extraction from this large amount of logged data. My paper aims to identify cyber-attack types as patterns in log files using advanced parallel computing approach and machine learning techniques. The MapReduce programming model is applied to parallel computing, while decision tree algorithms are used from machine learning.
I discuss two research questions in this paper. First, despite parallelization, are machine learning algorithms still able to provide results with acceptable accuracy measured by traditional data mining figures (accuracy, precision, recall, area under receiver operand characteristic [ROC] curve [AUC])? Second, is it possible to achieve significant performance improvement by measuring runtime execution of the algorithm by introducing several measurement points?
I proved that the machine learning model with two categories in the target variable is preferred to the one having five categories. The average performance improvement was 4–5 times faster for the whole algorithm compared to a single core solution. I achieved most of these improvements during the data transfer phase.

" ["hu_HU"]=> string(1309) "

These past years, cyber-attacks became a daily issue for enterprises. A possible defence against this kind of threat is intrusion detection. One of the key challenges is information extraction from this large amount of logged data. My paper aims to identify cyber-attack types as patterns in log files using advanced parallel computing approach and machine learning techniques. The MapReduce programming model is applied to parallel computing, while decision tree algorithms are used from machine learning.
I discuss two research questions in this paper. First, despite parallelization, are machine learning algorithms still able to provide results with acceptable accuracy measured by traditional data mining figures (accuracy, precision, recall, area under receiver operand characteristic [ROC] curve [AUC])? Second, is it possible to achieve significant performance improvement by measuring runtime execution of the algorithm by introducing several measurement points?
I proved that the machine learning model with two categories in the target variable is preferred to the one having five categories. The average performance improvement was 4–5 times faster for the whole algorithm compared to a single core solution. I achieved most of these improvements during the data transfer phase.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(61) "Processing Intrusion Data with Machine Learning and MapReduce" ["hu_HU"]=> string(61) "Processing Intrusion Data with Machine Learning and MapReduce" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#765 (6) { ["_data"]=> array(15) { ["id"]=> int(1850) ["email"]=> string(29) "csaba.brunner@uni-corvinus.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1729) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Brunner" ["hu_HU"]=> string(7) "Brunner" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Csaba" ["hu_HU"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(19) "intrusion detection" [1]=> string(19) "parallel processing" [2]=> string(16) "machine learning" [3]=> string(16) "network security" } ["en_US"]=> array(4) { [0]=> string(19) "intrusion detection" [1]=> string(19) "parallel processing" [2]=> string(16) "machine learning" [3]=> string(16) "network security" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#749 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19918) ["id"]=> int(925) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1729) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(29) { ["id"]=> int(1731) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2022-01-07 15:30:03" ["sectionId"]=> int(38) ["seq"]=> int(9) ["submissionId"]=> int(1614) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "53-61" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.5" ["abstract"]=> array(2) { ["en_US"]=> string(298) "

This paper focuses on the remuneration of employees of the defence sector in the context of legislative changes. Its target are the periods between 1999–2006 and 30. 6. 2015–2007. In a chronological survey, there are indicated the legislative changes and related ministerial regulations.

" ["hu_HU"]=> string(298) "

This paper focuses on the remuneration of employees of the defence sector in the context of legislative changes. Its target are the periods between 1999–2006 and 30. 6. 2015–2007. In a chronological survey, there are indicated the legislative changes and related ministerial regulations.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(82) "Remuneration of the Defence Sector Employees in the Context of Legislative Changes" ["hu_HU"]=> string(82) "Remuneration of the Defence Sector Employees in the Context of Legislative Changes" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#776 (6) { ["_data"]=> array(15) { ["id"]=> int(1853) ["email"]=> string(23) "monika.davidova@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1731) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Davidová" ["hu_HU"]=> string(9) "Davidová" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Monika" ["hu_HU"]=> string(6) "Monika" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#777 (6) { ["_data"]=> array(15) { ["id"]=> int(1854) ["email"]=> string(23) "aloiz.flachbart@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1731) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Flachbart" ["hu_HU"]=> string(9) "Flachbart" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Alojz" ["hu_HU"]=> string(5) "Alojz" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#767 (6) { ["_data"]=> array(15) { ["id"]=> int(1855) ["email"]=> string(19) "libor.jilek@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1731) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Jílek" ["hu_HU"]=> string(6) "Jílek" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Libor" ["hu_HU"]=> string(5) "Libor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(12) "remuneration" [1]=> string(36) "legislation on employee remuneration" [2]=> string(18) "salary development" } ["en_US"]=> array(3) { [0]=> string(12) "remuneration" [1]=> string(36) "legislation on employee remuneration" [2]=> string(18) "salary development" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#770 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21280) ["id"]=> int(927) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1731) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#745 (6) { ["_data"]=> array(27) { ["id"]=> int(1732) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2021-11-17 16:21:37" ["sectionId"]=> int(38) ["seq"]=> int(10) ["submissionId"]=> int(1615) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "63-76" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.6" ["abstract"]=> array(2) { ["en_US"]=> string(1608) "

The relevance of the above quotation from an excellent author and economist, adapted to present day Hungarian local governments, is unquestionable. At the beginning of the 21st century, in a globalizing world, the demand for the direct inclusion of independent social groups and individuals and the maintenance of the communities within geographical localities have become a primary issue as opposed to the conditions under the alienating, technocratic, impersonalizing and centralized political regimes of the Europe of the second half of the past century. For this reason, the importance of the role of local leadership is magnified.
The program included training for the local governments in the convergence regions, and had three pillars. The first pillar includes 6 post graduate e-learning training programs studied by approximately twenty thousand public officers. The second pillar is the network of the so-called Local Community Academies, comprising the elaboration of strategic methodologies by local participants to be recommended to local governments. The third pillar supported the traditional classroom training for three hundred local government employees.
The program of the Local Community Academies (LCA) aimed to support the social inclusion, and the ability of strategy-making. This study aims to answer the following research question: “How did the engagement and involvement of local government leaders, affect participatory planning during implementation of the LCA program?” The relevant research method is an empirical analysis of survey data and final reports.

" ["hu_HU"]=> string(1608) "

The relevance of the above quotation from an excellent author and economist, adapted to present day Hungarian local governments, is unquestionable. At the beginning of the 21st century, in a globalizing world, the demand for the direct inclusion of independent social groups and individuals and the maintenance of the communities within geographical localities have become a primary issue as opposed to the conditions under the alienating, technocratic, impersonalizing and centralized political regimes of the Europe of the second half of the past century. For this reason, the importance of the role of local leadership is magnified.
The program included training for the local governments in the convergence regions, and had three pillars. The first pillar includes 6 post graduate e-learning training programs studied by approximately twenty thousand public officers. The second pillar is the network of the so-called Local Community Academies, comprising the elaboration of strategic methodologies by local participants to be recommended to local governments. The third pillar supported the traditional classroom training for three hundred local government employees.
The program of the Local Community Academies (LCA) aimed to support the social inclusion, and the ability of strategy-making. This study aims to answer the following research question: “How did the engagement and involvement of local government leaders, affect participatory planning during implementation of the LCA program?” The relevant research method is an empirical analysis of survey data and final reports.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(186) "Impact of Leaders The Impact of the Engagement of Local Government Leaders’ on the Effectiveness of Participatory Planning as Found in the Local Community Academy Program (2014–2015)" ["hu_HU"]=> string(186) "Impact of Leaders The Impact of the Engagement of Local Government Leaders’ on the Effectiveness of Participatory Planning as Found in the Local Community Academy Program (2014–2015)" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#781 (6) { ["_data"]=> array(15) { ["id"]=> int(5794) ["email"]=> string(18) "rszamado@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1732) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Számadó" ["hu_HU"]=> string(9) "Számadó" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Róza" ["hu_HU"]=> string(5) "Róza" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(22) "participatory planning" [1]=> string(10) "engagement" [2]=> string(9) "inclusion" [3]=> string(35) "successful community collaborations" } ["en_US"]=> array(4) { [0]=> string(22) "participatory planning" [1]=> string(10) "engagement" [2]=> string(9) "inclusion" [3]=> string(35) "successful community collaborations" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#779 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19920) ["id"]=> int(928) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1732) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#766 (6) { ["_data"]=> array(27) { ["id"]=> int(1734) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2022-01-07 15:29:10" ["sectionId"]=> int(38) ["seq"]=> int(11) ["submissionId"]=> int(1617) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "77-87" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.7" ["abstract"]=> array(2) { ["en_US"]=> string(1729) "

The security environment of the 21st century confronted the international community with unprecedented challenges. One could say that we are only facing current negative trends with slowly evolving responses. However, these statements seem to contradict some facts that prove, that although there are deficient aspects to the current security structures, we are able to effectively handle many of the national and international challenges. Over the centuries, installation of various walls, wall systems have repeatedly defended the integrity of an area, the community of people living there from armed groups or offensive units. We can also find examples where population movements and bilateral territorial conflicts weakened—the relatively stable—great powers, which in order to avoid further intrusion and considerable social changes, designed a so-called “buffer zone” on their external borders to defend their sovereignty. There is no question that the current border restriction processes try to rehabilitate a long-time frequently used scheme for the protection of nationals, which was in recent times burdened by sad associations, such as the Berlin Wall. This is proven by the fact that only since 2000, more than 25 walls were built for security purposes. In my analysis, considering the present processes, I highlight the security challenges of 21st century Europe and the tightened border security measures generated by the fears and threats. I also stress the impact of the recent wave of migration in the transit states’ and western countries’ security system, as well as outline the activities of the Eastern European and Baltic states in response to the deteriorating relationship with Russia.

" ["hu_HU"]=> string(1729) "

The security environment of the 21st century confronted the international community with unprecedented challenges. One could say that we are only facing current negative trends with slowly evolving responses. However, these statements seem to contradict some facts that prove, that although there are deficient aspects to the current security structures, we are able to effectively handle many of the national and international challenges. Over the centuries, installation of various walls, wall systems have repeatedly defended the integrity of an area, the community of people living there from armed groups or offensive units. We can also find examples where population movements and bilateral territorial conflicts weakened—the relatively stable—great powers, which in order to avoid further intrusion and considerable social changes, designed a so-called “buffer zone” on their external borders to defend their sovereignty. There is no question that the current border restriction processes try to rehabilitate a long-time frequently used scheme for the protection of nationals, which was in recent times burdened by sad associations, such as the Berlin Wall. This is proven by the fact that only since 2000, more than 25 walls were built for security purposes. In my analysis, considering the present processes, I highlight the security challenges of 21st century Europe and the tightened border security measures generated by the fears and threats. I also stress the impact of the recent wave of migration in the transit states’ and western countries’ security system, as well as outline the activities of the Eastern European and Baltic states in response to the deteriorating relationship with Russia.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(87) "Fences and Border Protection: The Question of Establishing Technical Barriers in Europe" ["hu_HU"]=> string(87) "Fences and Border Protection: The Question of Establishing Technical Barriers in Europe" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#746 (6) { ["_data"]=> array(15) { ["id"]=> int(1857) ["email"]=> string(23) "besenyo.janos@hm.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1734) ["seq"]=> int(11) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Besenyő" ["hu_HU"]=> string(8) "Besenyő" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(7) { [0]=> string(9) "migration" [1]=> string(12) "border fence" [2]=> string(15) "border security" [3]=> string(6) "Europe" [4]=> string(17) "Ceuta and Mellila" [5]=> string(13) "Calais Jungle" [6]=> string(27) "southern closing of borders" } ["en_US"]=> array(7) { [0]=> string(9) "migration" [1]=> string(12) "border fence" [2]=> string(15) "border security" [3]=> string(6) "Europe" [4]=> string(17) "Ceuta and Mellila" [5]=> string(13) "Calais Jungle" [6]=> string(27) "southern closing of borders" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#778 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21279) ["id"]=> int(929) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1734) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#771 (6) { ["_data"]=> array(27) { ["id"]=> int(1735) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2022-01-07 15:28:36" ["sectionId"]=> int(38) ["seq"]=> int(12) ["submissionId"]=> int(1618) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "89-97" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.8" ["abstract"]=> array(2) { ["en_US"]=> string(1048) "

In this paper, an attempt has been made to unveil how strategic thinking contributes to corporate identity and survival. The instrument used to collect the data was a questionnaire which included a scale on creativity, pragmatic opportunism and intellectual informatism. The sample included the middle and top management of the telecom organizations in Pakistan. The questionnaires were distributed to 125 respondents and an 80% response was received. Results showed that strategic thinking has a fairly positive effect on corporate identity (CI). Among the creativity, intellectual informatism and pragmatic opportunism and when regressed with CI, pragmatic opportunism has the strongest effect on CI; creativity has a fairly positive impact on CI, whereas, intellectual informatism does not show significant impact on CI. Hopefully, this study will be informative for management about learning how they can use the available yet unfound opportunities and information within their creativity to build and maintain a good corporate identity.

" ["hu_HU"]=> string(1048) "

In this paper, an attempt has been made to unveil how strategic thinking contributes to corporate identity and survival. The instrument used to collect the data was a questionnaire which included a scale on creativity, pragmatic opportunism and intellectual informatism. The sample included the middle and top management of the telecom organizations in Pakistan. The questionnaires were distributed to 125 respondents and an 80% response was received. Results showed that strategic thinking has a fairly positive effect on corporate identity (CI). Among the creativity, intellectual informatism and pragmatic opportunism and when regressed with CI, pragmatic opportunism has the strongest effect on CI; creativity has a fairly positive impact on CI, whereas, intellectual informatism does not show significant impact on CI. Hopefully, this study will be informative for management about learning how they can use the available yet unfound opportunities and information within their creativity to build and maintain a good corporate identity.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(48) "Role of Strategic Thinking in Corporate Identity" ["hu_HU"]=> string(48) "Role of Strategic Thinking in Corporate Identity" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#790 (6) { ["_data"]=> array(15) { ["id"]=> int(1859) ["email"]=> string(17) "awkhan2@yahoo.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1735) ["seq"]=> int(12) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Waheed" ["hu_HU"]=> string(6) "Waheed" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Ajmal" ["hu_HU"]=> string(5) "Ajmal" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#783 (6) { ["_data"]=> array(15) { ["id"]=> int(1860) ["email"]=> string(17) "noor7pk@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1735) ["seq"]=> int(12) ["userGroupId"]=> int(82) ["country"]=> string(2) "PK" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Baig" ["hu_HU"]=> string(4) "Baig" } ["givenName"]=> array(2) { ["en_US"]=> string(11) "Noor ul Ain" ["hu_HU"]=> string(11) "Noor ul Ain" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(18) "corporate identity" [1]=> string(18) "strategic thinking" [2]=> string(18) "strategic planning" } ["en_US"]=> array(3) { [0]=> string(18) "corporate identity" [1]=> string(18) "strategic thinking" [2]=> string(18) "strategic planning" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#784 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21278) ["id"]=> int(931) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1735) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#785 (6) { ["_data"]=> array(27) { ["id"]=> int(1736) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2017-04-30" ["lastModified"]=> string(19) "2022-01-07 15:28:04" ["sectionId"]=> int(38) ["seq"]=> int(13) ["submissionId"]=> int(1619) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(117) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "99-105" ["pub-id::doi"]=> string(23) "10.32565/aarms.2017.1.9" ["abstract"]=> array(2) { ["en_US"]=> string(904) "

The fight against terrorism is still based on the nation-state framework, but international organizations have a greater focus on the prevention of terrorist acts. The European Union is not a military organization, it is involved mainly in prevention and combating crime and terrorism financing operations, and to resolve the consequences of an attack. In contrast, NATO is mainly focused on the fight against terrorism from a military perspective. It is important to emphasize that the fight against global terrorism can only be successful if comprehensive, international, multilateral action is taken, which includes military operations, in addition to political, economic, legal, diplomatic and social tools.
This analysis will seek to determine how those facts influence the NATO Counter Terrorism (CT) task and whether they are sufficient to justify making it a NATO core responsibility.

" ["hu_HU"]=> string(904) "

The fight against terrorism is still based on the nation-state framework, but international organizations have a greater focus on the prevention of terrorist acts. The European Union is not a military organization, it is involved mainly in prevention and combating crime and terrorism financing operations, and to resolve the consequences of an attack. In contrast, NATO is mainly focused on the fight against terrorism from a military perspective. It is important to emphasize that the fight against global terrorism can only be successful if comprehensive, international, multilateral action is taken, which includes military operations, in addition to political, economic, legal, diplomatic and social tools.
This analysis will seek to determine how those facts influence the NATO Counter Terrorism (CT) task and whether they are sufficient to justify making it a NATO core responsibility.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(92) "What the NATO Alliance Is Currently Advocating and Delivering in the Counter Terrorism Arena" ["hu_HU"]=> string(92) "What the NATO Alliance Is Currently Advocating and Delivering in the Counter Terrorism Arena" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#787 (6) { ["_data"]=> array(15) { ["id"]=> int(1861) ["email"]=> string(24) "pogacsas.imre@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1736) ["seq"]=> int(13) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Pogácsás" ["hu_HU"]=> string(10) "Pogácsás" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Imre" ["hu_HU"]=> string(4) "Imre" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(27) "terrorism-counter terrorism" [1]=> string(15) "global security" [2]=> string(13) "role for NATO" [3]=> string(30) "strategic and military concept" [4]=> string(18) "collective defence" [5]=> string(30) "international responsibilities" } ["en_US"]=> array(6) { [0]=> string(27) "terrorism-counter terrorism" [1]=> string(15) "global security" [2]=> string(13) "role for NATO" [3]=> string(30) "strategic and military concept" [4]=> string(18) "collective defence" [5]=> string(30) "international responsibilities" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#792 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21277) ["id"]=> int(932) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1736) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF